Our desktop team is rolling out a new patch management service (Shavlik) which only sends a limited amount of logs to the central system. I wanted to see whether or not it would be managable to remotely configure lightweight forwarders on all the clients to send the logs through splunk. The only thing is many of these laptops do not connect to our network on a daily basis, either from being hard-wired or VPN. My concern is that if these devices are being used off network will the lightweight forwarder throw back errors because it cannot reach the heavy forwarder/indexes? Also, would this create excess logs in ESS via "Expected Host Not Reporting" incidents?
No this will not be a problem. The forwarder gracefully stops and waits for the indexer to become available again. It will log that it can't get to the indexer but that isn't a problem.
In ES you can state which devices are expected and which are intermittent so as long as you set this correctly it will not complain. But one thing to be aware of is ES normally only looks at the last 24 hours for security issues. If splunk doesn't get the logs for longer, it may not be detected. You can probably adjust the corrolation searches to allow for this.
No this will not be a problem. The forwarder gracefully stops and waits for the indexer to become available again. It will log that it can't get to the indexer but that isn't a problem.
In ES you can state which devices are expected and which are intermittent so as long as you set this correctly it will not complain. But one thing to be aware of is ES normally only looks at the last 24 hours for security issues. If splunk doesn't get the logs for longer, it may not be detected. You can probably adjust the corrolation searches to allow for this.